WO2017000351A1 - Identity verification method and apparatus - Google Patents
Identity verification method and apparatus Download PDFInfo
- Publication number
- WO2017000351A1 WO2017000351A1 PCT/CN2015/085839 CN2015085839W WO2017000351A1 WO 2017000351 A1 WO2017000351 A1 WO 2017000351A1 CN 2015085839 W CN2015085839 W CN 2015085839W WO 2017000351 A1 WO2017000351 A1 WO 2017000351A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- terminal device
- verification information
- verification
- target application
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Definitions
- the present application relates to the field of data security technologies, and in particular, to an identity verification method and apparatus.
- terminal equipment plays an increasingly important role in people's lives.
- the advent of the terminal equipment era has greatly facilitated people's lives and broadened people's horizons.
- the security of the data in the terminal device cannot be ignored.
- the terminal device stores a lot of information related to the terminal device user (online bank, contact, etc.).
- the non-terminal device user uses the terminal device, the non-terminal device user often uses the data snooping terminal in the terminal device.
- the privacy of the device user, the illegal behavior, etc. will have a bad impact on the life of the terminal device user.
- the present application provides an identity verification method and apparatus for ensuring the security of data in a terminal device by verifying the identity of the user of the terminal device.
- An authentication method that includes:
- the process of determining whether the comparison result of the first verification information and the second verification information meets a preset condition comprises:
- the first verification information is verification information generated by encrypting the first original verification information with a key corresponding to the target application in the terminal device
- the process of determining whether the comparison result of the first verification information and the second verification information meets a preset condition includes:
- the method further includes:
- the target account information is account information of a target application in the terminal device, and whether the second fingerprint information is fingerprint information corresponding to a target application in the terminal device;
- the method further includes:
- An authentication device includes:
- An information feedback unit configured to return, to the terminal device, first verification information corresponding to the first operation instruction, in response to the received first operation instruction input by the user to the target application in the terminal device;
- An information receiving unit configured to receive first fingerprint information and second verification information input by a user
- a first determining unit configured to determine whether the first fingerprint information is fingerprint information corresponding to a target application in the terminal device
- the executing unit is configured to prohibit, when the first fingerprint information is not the fingerprint information corresponding to the target application in the terminal device, performing an action corresponding to the first operation instruction;
- a second determining unit configured to determine, when the first fingerprint information is the fingerprint information corresponding to the target application in the terminal device, whether the comparison result of the first verification information and the second verification information meets a preset condition
- the execution unit is further configured to prohibit execution of an action corresponding to the first operation instruction when a comparison result of the first verification information and the second verification information does not satisfy a preset condition.
- the second determining unit compares the first verification information and the second verification information to determine whether the same is the same; and, when the same, determines that the comparison result of the first verification information and the second verification information meets a preset Condition; when not identical, determining the first verification information and the second verification The comparison result of the certificate information does not satisfy the preset condition.
- the second determining unit acquires And the key corresponding to the target application in the terminal device; and decrypting the second verification information by using the key to obtain second original verification information; and comparing the first original verification information and a second original verification information, determining whether the same is the same; and, when the same, determining that the comparison result of the first verification information and the second verification information meets a preset condition; when not the same, determining the first verification information and the first The comparison result of the verification information does not satisfy the preset condition.
- the first verification unit is further configured to: in response to the received second operation instruction input by the user to the target application in the terminal device, return to the terminal device for prompting to input the account.
- First prompt information of the information and the fingerprint information receiving the target account information and the second fingerprint information input by the user; determining whether the target account information is account information of the target application in the terminal device, and the second fingerprint information Whether it is fingerprint information corresponding to the target application in the terminal device; when the target account information is not the account information of the target application in the terminal device, or the second fingerprint information is not related to the terminal
- the action corresponding to the second operation instruction is prohibited.
- the second verification unit is further configured to: in response to the received third operation instruction input by the user to the terminal device, return a second information for prompting input of fingerprint information to the terminal device. And prompting the third fingerprint information input by the user; and, when the third fingerprint information is not the fingerprint information corresponding to the terminal device, prohibiting an action corresponding to the third operation instruction.
- the present application provides an authentication method and apparatus, and returns first authentication information corresponding to a first operation instruction to a terminal device in response to a received first operation instruction of a target application in a terminal device by the user; The first fingerprint information and the second verification information; and when the first fingerprint information is not the fingerprint information corresponding to the target application in the terminal device, prohibiting the execution of the action corresponding to the first operation instruction; when the first fingerprint information is the terminal Fingerprint information corresponding to the target application in the device, and the comparison result of the first verification information and the second verification information is not satisfied
- the preset condition is met, the manner of performing the action corresponding to the first operation instruction is prohibited, the verification of the identity of the terminal device user is realized, and the security of the data in the terminal device is ensured.
- FIG. 2 is a flowchart of a method for determining whether a comparison result of a first verification information and a second verification information meets a preset condition according to Embodiment 1 of the present application;
- FIG. 3 is a flowchart of another method for authenticating an identity provided on the basis of FIG. 1 according to Embodiment 1 of the present application;
- FIG. 4 is a flowchart of still another method for authenticating an identity provided on the basis of FIG. 1 according to Embodiment 1 of the present application;
- FIG. 5 is a schematic structural diagram of an identity verification apparatus according to Embodiment 2 of the present application.
- FIG. 6 is a schematic structural diagram of another identity verification apparatus according to Embodiment 2 of the present application.
- FIG. 7 is a schematic structural diagram of still another identity verification apparatus according to Embodiment 2 of the present application.
- Embodiment 1 is a diagrammatic representation of Embodiment 1:
- FIG. 1 is a flowchart of an identity verification method according to Embodiment 1 of the present application.
- the method includes:
- the user may input a first operation instruction for the application in the terminal device, and an identity verification method provided by the embodiment of the present application, after receiving the first operation instruction, responds to the The first operation instruction returns the verification information corresponding to the first operation instruction to the terminal device, and the verification information is referred to as the first verification information.
- An identity verification method provided by an embodiment of the present application is preferably applied to a server corresponding to a target application in a terminal device.
- S102 Receive first fingerprint information and second verification information input by a user.
- the user may input the fingerprint information and the verification on the terminal device according to the first verification information displayed on the terminal device.
- Information here, the fingerprint information input by the user on the terminal device is referred to as first fingerprint information, and the verification information input by the user on the terminal device is referred to as second verification information.
- an identity verification method provided by the embodiment of the present application can receive the first fingerprint information and the second verification information input by the user through the terminal device.
- the second verification information when the user input is correct, is the same as the first verification information returned to the terminal device; when the user inputs an error, the second verification information is returned to the terminal.
- the first verification information of the device is different.
- each fingerprint information corresponding to the target application in the terminal device is set in advance. After receiving the first fingerprint information and the second verification information input by the user, determining whether the first fingerprint information is fingerprint information corresponding to the target application in the terminal device, that is, in the preset and the terminal device In the respective fingerprint information corresponding to the target application, searching for the same fingerprint information as the first fingerprint information; when present, determining that the first fingerprint information is the fingerprint information corresponding to the target application in the terminal device; when it does not exist Time, Then, it is determined that the first fingerprint information is not fingerprint information corresponding to the target application in the terminal device.
- step S104 Determine whether the comparison result of the first verification information and the second verification information meets a preset condition; when not, perform step S105.
- the action corresponding to the first operation instruction is allowed to be performed.
- the above is only a preferred mode of the embodiment of the present application.
- the inventor can arbitrarily set the execution mode when the comparison result of the first verification information and the second verification information meets the preset condition, which is not limited herein.
- the present application provides an identity verification method, by responding to a received first user operation command of a target application in a terminal device, returning first verification information corresponding to the first operation instruction to the terminal device; receiving the first input of the user The fingerprint information and the second verification information; and when the first fingerprint information is not the fingerprint information corresponding to the target application in the terminal device, prohibiting the action corresponding to the first operation instruction; when the first fingerprint information is in the terminal device
- the fingerprint information corresponding to the target application and the comparison result of the first verification information and the second verification information do not satisfy the preset condition, the manner of performing the action corresponding to the first operation instruction is prohibited, and the identity of the terminal device user is realized.
- the verification ensures the security of the data in the terminal device.
- the process of determining whether the comparison result of the first verification information and the second verification information meets the preset condition comprises: comparing the first verification information with the second verification information to determine whether the same condition is the same; And determining that the comparison result of the first verification information and the second verification information meets a preset condition; when not the same, determining that the comparison result of the first verification information and the second verification information does not satisfy the preset condition.
- the first verification information corresponding to the first operation instruction returned to the terminal device is the first verification code
- the foregoing is only a preferred mode of the embodiment of the present application, and the inventor may
- the specific content of the first verification information corresponding to the first operation instruction returned to the terminal device after the first operation instruction input by the user to the target application in the terminal device is arbitrarily set, and is not limited herein.
- the first verification information is the verification information generated by encrypting the first original verification information by using a key corresponding to the target application in the terminal device
- the first verification information is determined.
- the process of comparing the result of the comparison with the second verification information to meet the preset condition is as shown in FIG. 2, and the method includes:
- a key corresponding to the target application in the terminal device is preset, and the first original verification information is encrypted by the key to generate the first verification information.
- the preset key corresponding to the target application in the terminal setting may be: one of the preset fingerprint information corresponding to the target application in the terminal device.
- the information is generated according to the default key generation rule.
- the key generation rule refer to the prior art, which is not limited herein.
- the first verification information is the verification information generated by encrypting the first original verification information by using a key corresponding to the target application in the terminal device
- the first determination is performed. In the process of whether the comparison result of the verification information and the second verification information meets the preset condition, first, it is necessary to acquire a key corresponding to the target application in the terminal device.
- the first verification information is a first verification code
- the first verification information is generated by encrypting the first original verification information by using a key corresponding to the target application in the terminal device.
- the first original verification code is the first original verification code
- the first verification code is the verification generated by encrypting the first original verification code by using a key corresponding to the target application in the terminal device. code.
- the first original verification code may be randomly generated.
- step S203 Compare the first original verification information and the second original verification information, and determine whether they are the same; when they are the same, step S204 is performed; when they are not the same, step S205 is performed.
- the method includes:
- the account information is login information, such as a username and a password.
- login information such as a username and a password.
- S302. Receive target account information and second fingerprint information input by the user.
- the user after the user sees the first prompt information for prompting to input the account information and the fingerprint information, the user needs to input the account information and the fingerprint information through the terminal device.
- the account information input by the user through the terminal device is referred to as target account information
- the fingerprint information input by the user through the terminal device is referred to as second fingerprint information.
- S303 Determine whether the target account information is account information of the target application in the terminal device, and whether the second fingerprint information is fingerprint information corresponding to the target application in the terminal device.
- the account information of the target application in the terminal device and the respective fingerprint information corresponding to the target application in the terminal device are preset.
- the target account information is the account information of the target application in the terminal device, and whether the second fingerprint information is the fingerprint information corresponding to the target application in the terminal device.
- the action indicated by the second operation instruction is a target application in the login terminal device.
- FIG. 4 Another identity verification method is further included, as shown in FIG. 4 .
- the method includes:
- the user may input a third operation instruction to the terminal device, and after receiving the third operation instruction input by the user to the terminal device, returning to the terminal device to prompt the user to input the fingerprint information. Two prompt information.
- S402. Receive third fingerprint information input by a user.
- the fingerprint information needs to be input through the terminal device, and the fingerprint information is referred to as a third fingerprint. information.
- each fingerprint information corresponding to the terminal device is preset, and when the third fingerprint information is not the fingerprint information corresponding to the terminal device, the action corresponding to the third operation instruction is prohibited.
- the third operation instruction is a power-on command or a standby wake-up command, wherein the power-on command is used to indicate that the terminal device is turned on, and the standby wake-up command is used to indicate that the terminal device wakes up from the standby state.
- Embodiment 2 is a diagrammatic representation of Embodiment 1:
- FIG. 5 is a schematic structural diagram of an identity verification apparatus according to Embodiment 2 of the present application.
- the device includes:
- the information feedback unit 1 is configured to, in response to the received first operation instruction input by the user to the target application in the terminal device, return the first verification information corresponding to the first operation instruction to the terminal device;
- the information receiving unit 2 is configured to receive first fingerprint information and second verification information input by the user.
- the first determining unit 3 is configured to determine whether the first fingerprint information is fingerprint information corresponding to the target application in the terminal device.
- the executing unit 4 is configured to prohibit performing an action corresponding to the first operation instruction when the first fingerprint information is not the fingerprint information corresponding to the target application in the terminal device.
- the second determining unit 5 is configured to determine, when the first fingerprint information is the fingerprint information corresponding to the target application in the terminal device, whether the comparison result of the first verification information and the second verification information meets a preset condition.
- the execution unit 4 is further configured to prohibit execution of an action corresponding to the first operation instruction when the comparison result of the first verification information and the second verification information does not satisfy the preset condition.
- the second determining unit compares the first verification information and the second verification information to determine whether the same is the same; and, when the same, determines that the comparison result of the first verification information and the second verification information meets the pre- If the conditions are different, it is determined that the comparison result of the first verification information and the second verification information does not satisfy the preset condition.
- the second determining unit acquires a key corresponding to the target application in the terminal device; and decrypting the second verification information by using the key to obtain second original verification information; and comparing the first original verification information with the second original verification information to determine whether the same And when the same, it is determined that the comparison result of the first verification information and the second verification information satisfies a preset condition; when not the same, it is determined that the comparison result of the first verification information and the second verification information does not satisfy the preset condition.
- FIG. 6 is a schematic structural diagram of another identity verification apparatus according to Embodiment 2 of the present application.
- another identity verification apparatus provided in the second embodiment of the present application further includes: a first verification unit 6, and the first verification unit 6 is configured to receive the response.
- a first verification unit 6 is configured to receive the response.
- the user to the second operation instruction input by the target application in the terminal device, returning, to the terminal device, a first prompt message for prompting to input account information and fingerprint information
- Receiving target account information and second fingerprint information input by the user determining whether the target account information is account information of the target application in the terminal device, and whether the second fingerprint information is fingerprint information corresponding to the target application in the terminal device;
- the action corresponding to the second operation instruction is prohibited.
- FIG. 7 is a schematic structural diagram of still another identity verification apparatus according to Embodiment 2 of the present application.
- another identity verification apparatus provided in Embodiment 2 of the present application further includes: a second verification unit 7 for responding to the reception, based on the identity verification apparatus provided in the foregoing embodiment.
- a second verification unit 7 for responding to the reception, based on the identity verification apparatus provided in the foregoing embodiment.
- the present application provides an identity verification apparatus, by responding to a received first operation instruction of a target application in a terminal device by a user, returning first verification information corresponding to the first operation instruction to the terminal device; receiving the first input by the user The fingerprint information and the second verification information; and when the first fingerprint information is not the fingerprint information corresponding to the target application in the terminal device, prohibiting the action corresponding to the first operation instruction; when the first fingerprint information is in the terminal device
- the fingerprint information corresponding to the target application and the comparison result of the first verification information and the second verification information do not satisfy the preset condition, the manner of performing the action corresponding to the first operation instruction is prohibited, and the identity of the terminal device user is realized.
- the verification ensures the security of the data in the terminal device.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
- Telephone Function (AREA)
Abstract
An identity verification method and apparatus. The method comprises: in response to a received first operation instruction of a user to a target application program in a terminal device, returning, to the terminal device, first verification information corresponding to the first operation instruction (S101); receiving first fingerprint information and second verification information input by a user (S102); when the first fingerprint information is not the fingerprint information corresponding to the target application program in the terminal device, forbidding the execution of an action corresponding to the first operation instruction (S103, S105); and when the first fingerprint information is the fingerprint information corresponding to the target application program in the terminal device, and a comparison result of the first verification information and the second verification information does not satisfy a pre-set condition, forbidding the execution of the action corresponding to the first operation instruction (S103, S104, S105). In this way, the identity of the user of the terminal device is verified, and the security of data in the terminal device is ensured.
Description
本申请要求于2015年06月29日提交中国专利局,申请号为201510368717.6、发明名称为“一种身份验证方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。The present application claims priority to Chinese Patent Application No. 20151036871, the entire disclosure of which is incorporated herein by reference. .
本申请涉及数据安全技术领域,特别是涉及一种身份验证方法及装置。The present application relates to the field of data security technologies, and in particular, to an identity verification method and apparatus.
随着人们生活水平的提高,终端设备在人们的生活中占有越来越重要的角色,终端设备时代的到来,极大程度上方便了人们的生活、拓宽了人们的视野。然而,人们在享受终端设备带来的便利的时候,终端设备中数据的安全性问题也是不容忽视的。With the improvement of people's living standards, terminal equipment plays an increasingly important role in people's lives. The advent of the terminal equipment era has greatly facilitated people's lives and broadened people's horizons. However, when people enjoy the convenience brought by the terminal device, the security of the data in the terminal device cannot be ignored.
例如,终端设备中存储有很多与该终端设备用户相关的信息(网上银行、联系人等),当非终端设备用户使用该终端设备后,往往存在非终端设备用户利用终端设备中的数据窥探终端设备用户隐私、进行不法行为等情况,进而会对终端设备用户的生活产生恶劣的影响。For example, the terminal device stores a lot of information related to the terminal device user (online bank, contact, etc.). When the non-terminal device user uses the terminal device, the non-terminal device user often uses the data snooping terminal in the terminal device. The privacy of the device user, the illegal behavior, etc., will have a bad impact on the life of the terminal device user.
因此,亟需一种身份验证方法及装置,以保证终端设备中数据的安全性。Therefore, an authentication method and device are needed to ensure the security of data in the terminal device.
发明内容Summary of the invention
有鉴于此,本申请提供一种身份验证方法及装置,通过对终端设备使用者的身份的验证,保证终端设备中数据的安全性。In view of this, the present application provides an identity verification method and apparatus for ensuring the security of data in a terminal device by verifying the identity of the user of the terminal device.
为了实现上述目的,本发明实施例提供的技术方案如下:In order to achieve the above objective, the technical solution provided by the embodiment of the present invention is as follows:
一种身份验证方法,包括:An authentication method that includes:
响应接收到的用户对终端设备中目标应用程序输入的第一操作指令,向所述终端设备返回与所述第一操作指令对应的第一验证信息;Responding to the first operation instruction input by the user to the target application in the terminal device, and returning, to the terminal device, first verification information corresponding to the first operation instruction;
接收用户输入的第一指纹信息和第二验证信息;
Receiving first fingerprint information and second verification information input by the user;
判断所述第一指纹信息是否为与所述终端设备中目标应用程序对应的指纹信息;Determining whether the first fingerprint information is fingerprint information corresponding to a target application in the terminal device;
当否时,禁止执行与所述第一操作指令对应的动作;When no, the action corresponding to the first operation instruction is prohibited from being performed;
当是时,判断所述第一验证信息和第二验证信息的比较结果是否满足预设条件;When yes, determining whether the comparison result of the first verification information and the second verification information meets a preset condition;
当不满足时,禁止执行与所述第一操作指令对应的动作。When not satisfied, the action corresponding to the first operation instruction is prohibited from being executed.
优选的,所述判断所述第一验证信息和第二验证信息的比较结果是否满足预设条件的过程包括:Preferably, the process of determining whether the comparison result of the first verification information and the second verification information meets a preset condition comprises:
比较所述第一验证信息和第二验证信息,判断是否相同;Comparing the first verification information and the second verification information to determine whether they are the same;
当相同时,确定所述第一验证信息和第二验证信息的比较结果满足预设条件;When the same, determining that the comparison result of the first verification information and the second verification information meets a preset condition;
当不相同时,确定所述第一验证信息和第二验证信息的比较结果不满足预设条件。When they are not the same, it is determined that the comparison result of the first verification information and the second verification information does not satisfy the preset condition.
优选的,当所述第一验证信息为利用预先设置的与所述终端设备中目标应用程序对应的密钥对第一原始验证信息加密后生成的验证信息时,Preferably, when the first verification information is verification information generated by encrypting the first original verification information with a key corresponding to the target application in the terminal device,
所述判断所述第一验证信息和第二验证信息的比较结果是否满足预设条件的过程包括:The process of determining whether the comparison result of the first verification information and the second verification information meets a preset condition includes:
获取与所述终端设备中目标应用程序对应的所述密钥;Obtaining the key corresponding to the target application in the terminal device;
利用所述密钥对所述第二验证信息进行解密,得到第二原始验证信息;Decrypting the second verification information by using the key to obtain second original verification information;
比较所述第一原始验证信息和第二原始验证信息,判断是否相同;Comparing the first original verification information and the second original verification information to determine whether they are the same;
当相同时,确定所述第一验证信息和第二验证信息的比较结果满足预设条件;When the same, determining that the comparison result of the first verification information and the second verification information meets a preset condition;
当不相同时,确定所述第一验证信息和第二验证信息的比较结果不满足预设条件。When they are not the same, it is determined that the comparison result of the first verification information and the second verification information does not satisfy the preset condition.
优选的,还包括:Preferably, the method further includes:
响应接收到的用户对所述终端设备中目标应用程序输入的第二操作指令,向所述终端设备返回用于提示输入账户信息和指纹信息的第一提示信息;Responding to the second operation instruction input by the user to the target application in the terminal device, returning, to the terminal device, first prompt information for prompting to input account information and fingerprint information;
接收用户输入的目标账户信息和第二指纹信息;
Receiving target account information and second fingerprint information input by the user;
判断所述目标账户信息是否为所述终端设备中目标应用程序的账户信息,以及所述第二指纹信息是否为与所述终端设备中目标应用程序对应的指纹信息;Determining whether the target account information is account information of a target application in the terminal device, and whether the second fingerprint information is fingerprint information corresponding to a target application in the terminal device;
当所述目标账户信息不为所述终端设备中目标应用程序的账户信息,或者,所述第二指纹信息不为与所述终端设备中目标应用程序对应的指纹信息时,禁止执行与所述第二操作指令对应的动作。When the target account information is not the account information of the target application in the terminal device, or the second fingerprint information is not the fingerprint information corresponding to the target application in the terminal device, execution and execution are prohibited. The action corresponding to the second operation instruction.
优选的,还包括:Preferably, the method further includes:
响应接收到的用户对所述终端设备输入的第三操作指令,向所述终端设备返回用于提示输入指纹信息的第二提示信息;Responding to the received third operation instruction input by the user to the terminal device, returning, to the terminal device, second prompt information for prompting input of fingerprint information;
接收用户输入的第三指纹信息;Receiving third fingerprint information input by the user;
当所述第三指纹信息不为与所述终端设备对应的指纹信息时,禁止执行与所述第三操作指令对应的动作。When the third fingerprint information is not fingerprint information corresponding to the terminal device, performing an action corresponding to the third operation instruction is prohibited.
一种身份验证装置,包括:An authentication device includes:
信息反馈单元,用于响应接收到的用户对终端设备中目标应用程序输入的第一操作指令,向所述终端设备返回与所述第一操作指令对应的第一验证信息;An information feedback unit, configured to return, to the terminal device, first verification information corresponding to the first operation instruction, in response to the received first operation instruction input by the user to the target application in the terminal device;
信息接收单元,用于接收用户输入的第一指纹信息和第二验证信息;An information receiving unit, configured to receive first fingerprint information and second verification information input by a user;
第一判断单元,用于判断所述第一指纹信息是否为与所述终端设备中目标应用程序对应的指纹信息;a first determining unit, configured to determine whether the first fingerprint information is fingerprint information corresponding to a target application in the terminal device;
执行单元,用于当第一指纹信息不为与所述终端设备中目标应用程序对应的指纹信息时,禁止执行与所述第一操作指令对应的动作;The executing unit is configured to prohibit, when the first fingerprint information is not the fingerprint information corresponding to the target application in the terminal device, performing an action corresponding to the first operation instruction;
第二判断单元,用于当第一指纹信息为与所述终端设备中目标应用程序对应的指纹信息时,判断所述第一验证信息和第二验证信息的比较结果是否满足预设条件;a second determining unit, configured to determine, when the first fingerprint information is the fingerprint information corresponding to the target application in the terminal device, whether the comparison result of the first verification information and the second verification information meets a preset condition;
所述执行单元,还用于当所述第一验证信息和第二验证信息的比较结果不满足预设条件时,禁止执行与所述第一操作指令对应的动作。The execution unit is further configured to prohibit execution of an action corresponding to the first operation instruction when a comparison result of the first verification information and the second verification information does not satisfy a preset condition.
优选的,所述第二判断单元比较所述第一验证信息和第二验证信息,判断是否相同;以及,当相同时,确定所述第一验证信息和第二验证信息的比较结果满足预设条件;当不相同时,确定所述第一验证信息和第二验
证信息的比较结果不满足预设条件。Preferably, the second determining unit compares the first verification information and the second verification information to determine whether the same is the same; and, when the same, determines that the comparison result of the first verification information and the second verification information meets a preset Condition; when not identical, determining the first verification information and the second verification
The comparison result of the certificate information does not satisfy the preset condition.
优选的,当所述第一验证信息为利用预先设置的与所述终端设备中目标应用程序对应的密钥对第一原始验证信息加密后生成的验证信息时,所述第二判断单元获取与所述终端设备中目标应用程序对应的所述密钥;以及,利用所述密钥对所述第二验证信息进行解密,得到第二原始验证信息;以及,比较所述第一原始验证信息和第二原始验证信息,判断是否相同;以及,当相同时,确定所述第一验证信息和第二验证信息的比较结果满足预设条件;当不相同时,确定所述第一验证信息和第二验证信息的比较结果不满足预设条件。Preferably, when the first verification information is verification information generated by encrypting the first original verification information by using a key corresponding to the target application in the terminal device, the second determining unit acquires And the key corresponding to the target application in the terminal device; and decrypting the second verification information by using the key to obtain second original verification information; and comparing the first original verification information and a second original verification information, determining whether the same is the same; and, when the same, determining that the comparison result of the first verification information and the second verification information meets a preset condition; when not the same, determining the first verification information and the first The comparison result of the verification information does not satisfy the preset condition.
优选的,还包括第一验证单元,所述第一验证单元用于响应接收到的用户对所述终端设备中目标应用程序输入的第二操作指令,向所述终端设备返回用于提示输入账户信息和指纹信息的第一提示信息;接收用户输入的目标账户信息和第二指纹信息;判断所述目标账户信息是否为所述终端设备中目标应用程序的账户信息,以及所述第二指纹信息是否为与所述终端设备中目标应用程序对应的指纹信息;当所述目标账户信息不为所述终端设备中目标应用程序的账户信息,或者,所述第二指纹信息不为与所述终端设备中目标应用程序对应的指纹信息时,禁止执行与所述第二操作指令对应的动作。Preferably, the first verification unit is further configured to: in response to the received second operation instruction input by the user to the target application in the terminal device, return to the terminal device for prompting to input the account. First prompt information of the information and the fingerprint information; receiving the target account information and the second fingerprint information input by the user; determining whether the target account information is account information of the target application in the terminal device, and the second fingerprint information Whether it is fingerprint information corresponding to the target application in the terminal device; when the target account information is not the account information of the target application in the terminal device, or the second fingerprint information is not related to the terminal When the fingerprint information corresponding to the target application in the device is prohibited, the action corresponding to the second operation instruction is prohibited.
优选的,还包括第二验证单元,所述第二验证单元用于响应接收到的用户对所述终端设备输入的第三操作指令,向所述终端设备返回用于提示输入指纹信息的第二提示信息;以及,接收用户输入的第三指纹信息;以及,当所述第三指纹信息不为与所述终端设备对应的指纹信息时,禁止执行与所述第三操作指令对应的动作。Preferably, the second verification unit is further configured to: in response to the received third operation instruction input by the user to the terminal device, return a second information for prompting input of fingerprint information to the terminal device. And prompting the third fingerprint information input by the user; and, when the third fingerprint information is not the fingerprint information corresponding to the terminal device, prohibiting an action corresponding to the third operation instruction.
本申请提供一种身份验证方法及装置,通过响应接收到的用户对终端设备中目标应用程序的第一操作指令,向终端设备返回与第一操作指令对应的第一验证信息;接收用户输入的第一指纹信息和第二验证信息;并当第一指纹信息不为与终端设备中目标应用程序对应的指纹信息时,禁止执行与第一操作指令对应的动作;当第一指纹信息为与终端设备中目标应用程序对应的指纹信息、且第一验证信息和第二验证信息的比较结果不满足
预设条件时,禁止执行与第一操作指令对应的动作的方式,实现了对终端设备使用者的身份的验证,保证了终端设备中数据的安全性。The present application provides an authentication method and apparatus, and returns first authentication information corresponding to a first operation instruction to a terminal device in response to a received first operation instruction of a target application in a terminal device by the user; The first fingerprint information and the second verification information; and when the first fingerprint information is not the fingerprint information corresponding to the target application in the terminal device, prohibiting the execution of the action corresponding to the first operation instruction; when the first fingerprint information is the terminal Fingerprint information corresponding to the target application in the device, and the comparison result of the first verification information and the second verification information is not satisfied
When the preset condition is met, the manner of performing the action corresponding to the first operation instruction is prohibited, the verification of the identity of the terminal device user is realized, and the security of the data in the terminal device is ensured.
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below. Obviously, the drawings in the following description are only It is an embodiment of the present invention, and those skilled in the art can obtain other drawings according to the provided drawings without any creative work.
图1为本申请实施例一提供的一种身份验证方法流程图;1 is a flowchart of an identity verification method according to Embodiment 1 of the present application;
图2为本申请实施例一提供的一种判断第一验证信息和第二验证信息的比较结果是否满足预设条件的方法流程图;2 is a flowchart of a method for determining whether a comparison result of a first verification information and a second verification information meets a preset condition according to Embodiment 1 of the present application;
图3为本申请实施例一在上述图1的基础上提供的另一种身份验证方法流程图;FIG. 3 is a flowchart of another method for authenticating an identity provided on the basis of FIG. 1 according to Embodiment 1 of the present application;
图4为本申请实施例一在上述图1的基础上提供的又一种身份验证方法流程图;4 is a flowchart of still another method for authenticating an identity provided on the basis of FIG. 1 according to Embodiment 1 of the present application;
图5为本申请实施例二提供的一种身份验证装置的结构示意图;FIG. 5 is a schematic structural diagram of an identity verification apparatus according to Embodiment 2 of the present application;
图6为本申请实施例二提供的另一种身份验证装置的结构示意图;FIG. 6 is a schematic structural diagram of another identity verification apparatus according to Embodiment 2 of the present application;
图7为本申请实施例二提供的又一种身份验证装置的结构示意图。FIG. 7 is a schematic structural diagram of still another identity verification apparatus according to Embodiment 2 of the present application.
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
实施例一:Embodiment 1:
图1为本申请实施例一提供的一种身份验证方法流程图。FIG. 1 is a flowchart of an identity verification method according to Embodiment 1 of the present application.
如图1所示,该方法包括:As shown in Figure 1, the method includes:
S101、响应接收到的用户对终端设备中目标应用程序输入的第一操作
指令,向终端设备返回与第一操作指令对应的第一验证信息。S101. Respond to the first operation of the received user input to the target application in the terminal device.
And instructing to return, to the terminal device, first verification information corresponding to the first operation instruction.
在本申请实施例中,优选的,用户可针对终端设备中的应用程序输入第一操作指令,当本申请实施例提供的一种身份验证方法,接收到该第一操作指令后,会响应该第一操作指令,向终端设备返回与第一操作指令对应的验证信息,且将该验证信息称为第一验证信息。In the embodiment of the present application, preferably, the user may input a first operation instruction for the application in the terminal device, and an identity verification method provided by the embodiment of the present application, after receiving the first operation instruction, responds to the The first operation instruction returns the verification information corresponding to the first operation instruction to the terminal device, and the verification information is referred to as the first verification information.
本申请实施例提供的一种身份验证方法,优选的,应用于与终端设备中的目标应用程序对应的服务器。An identity verification method provided by an embodiment of the present application is preferably applied to a server corresponding to a target application in a terminal device.
以上仅仅是本申请实施例的优选方式,发明人可根据自己的需求任意设置本申请实施例提供的一种身份验证方法应用的具体装置,在此不作限定。The above is only a preferred mode of the embodiment of the present application. The inventor can arbitrarily set a specific device for applying the identity verification method according to the embodiment of the present application, which is not limited herein.
S102、接收用户输入的第一指纹信息和第二验证信息。S102. Receive first fingerprint information and second verification information input by a user.
在本申请实施例中,优选的,当向终端设备返回与第一操作指令对应的第一验证信息后,用户可根据终端设备上显示的第一验证信息,在终端设备上输入指纹信息和验证信息,这里,将用户在终端设备上输入的指纹信息称为第一指纹信息,将用户在终端设备上输入的验证信息称为第二验证信息。In the embodiment of the present application, after the first verification information corresponding to the first operation instruction is returned to the terminal device, the user may input the fingerprint information and the verification on the terminal device according to the first verification information displayed on the terminal device. Information, here, the fingerprint information input by the user on the terminal device is referred to as first fingerprint information, and the verification information input by the user on the terminal device is referred to as second verification information.
进而本申请实施例提供的一种身份验证方法可接收到用户通过终端设备输入的第一指纹信息和第二验证信息。Furthermore, an identity verification method provided by the embodiment of the present application can receive the first fingerprint information and the second verification information input by the user through the terminal device.
在本申请实施例中,优选的,在用户输入正确的情况下,第二验证信息和返回给终端设备的第一验证信息相同;当用户输入错误的情况下,第二验证信息和返回给终端设备的第一验证信息不同。In the embodiment of the present application, preferably, when the user input is correct, the second verification information is the same as the first verification information returned to the terminal device; when the user inputs an error, the second verification information is returned to the terminal. The first verification information of the device is different.
S103、判断第一指纹信息是否为与终端设备中目标应用程序对应的指纹信息;当否时,执行步骤S105;当是时,执行步骤S104。S103. Determine whether the first fingerprint information is fingerprint information corresponding to the target application in the terminal device; if not, execute step S105; if yes, execute step S104.
在本申请实施例中,优选的,预先设置与终端设备中的目标应用程序对应的各个指纹信息。当接收到用户输入的第一指纹信息和第二验证信息后,需判断该第一指纹信息是否为与终端设备中的目标应用程序对应的指纹信息,也即在预设的与终端设备中的目标应用程序对应的各个指纹信息中,查找是否存在与第一指纹信息相同的指纹信息;当存在时,则确定第一指纹信息为与终端设备中的目标应用程序对应的指纹信息;当不存在时,
则确定第一指纹信息不为与终端设备中的目标应用程序对应的指纹信息。In the embodiment of the present application, preferably, each fingerprint information corresponding to the target application in the terminal device is set in advance. After receiving the first fingerprint information and the second verification information input by the user, determining whether the first fingerprint information is fingerprint information corresponding to the target application in the terminal device, that is, in the preset and the terminal device In the respective fingerprint information corresponding to the target application, searching for the same fingerprint information as the first fingerprint information; when present, determining that the first fingerprint information is the fingerprint information corresponding to the target application in the terminal device; when it does not exist Time,
Then, it is determined that the first fingerprint information is not fingerprint information corresponding to the target application in the terminal device.
S104、判断第一验证信息和第二验证信息的比较结果是否满足预设条件;当不满足时,执行步骤S105。S104. Determine whether the comparison result of the first verification information and the second verification information meets a preset condition; when not, perform step S105.
在本申请实施例中,优选的,当第一验证信息和第二验证信息的比较结果满足预设条件时,允许执行与第一操作指令对应的动作。In the embodiment of the present application, preferably, when the comparison result of the first verification information and the second verification information satisfies a preset condition, the action corresponding to the first operation instruction is allowed to be performed.
以上仅仅是本申请实施例的优选方式,发明人可根据自己的需求任意设置当第一验证信息和第二验证信息的比较结果满足预设条件时的执行方式,在此不作限定。The above is only a preferred mode of the embodiment of the present application. The inventor can arbitrarily set the execution mode when the comparison result of the first verification information and the second verification information meets the preset condition, which is not limited herein.
S105、禁止执行与第一操作指令对应的动作。S105. Execute the action corresponding to the first operation instruction.
本申请提供一种身份验证方法,通过响应接收到的用户对终端设备中目标应用程序的第一操作指令,向终端设备返回与第一操作指令对应的第一验证信息;接收用户输入的第一指纹信息和第二验证信息;并当第一指纹信息不为与终端设备中目标应用程序对应的指纹信息时,禁止执行与第一操作指令对应的动作;当第一指纹信息为与终端设备中目标应用程序对应的指纹信息、且第一验证信息和第二验证信息的比较结果不满足预设条件时,禁止执行与第一操作指令对应的动作的方式,实现了对终端设备使用者的身份的验证,保证了终端设备中数据的安全性。The present application provides an identity verification method, by responding to a received first user operation command of a target application in a terminal device, returning first verification information corresponding to the first operation instruction to the terminal device; receiving the first input of the user The fingerprint information and the second verification information; and when the first fingerprint information is not the fingerprint information corresponding to the target application in the terminal device, prohibiting the action corresponding to the first operation instruction; when the first fingerprint information is in the terminal device When the fingerprint information corresponding to the target application and the comparison result of the first verification information and the second verification information do not satisfy the preset condition, the manner of performing the action corresponding to the first operation instruction is prohibited, and the identity of the terminal device user is realized. The verification ensures the security of the data in the terminal device.
在本申请实施例中,优选的,判断第一验证信息和第二验证信息的比较结果是否满足预设条件的过程包括:比较第一验证信息和第二验证信息,判断是否相同;当相同时,确定第一验证信息和第二验证信息的比较结果满足预设条件;当不相同时,确定第一验证信息和第二验证信息的比较结果不满足预设条件。In the embodiment of the present application, preferably, the process of determining whether the comparison result of the first verification information and the second verification information meets the preset condition comprises: comparing the first verification information with the second verification information to determine whether the same condition is the same; And determining that the comparison result of the first verification information and the second verification information meets a preset condition; when not the same, determining that the comparison result of the first verification information and the second verification information does not satisfy the preset condition.
在本申请实施例中,优选的,向终端设备返回的与第一操作指令对应的第一验证信息为第一验证码,以上仅仅是本申请实施例的优选的方式,发明人可根据自己的需求任意设置响应接收到的用户对终端设备中目标应用程序输入的第一操作指令后,向终端设备返回的与第一操作指令对应的第一验证信息的具体内容,在此不作限定。
In the embodiment of the present application, preferably, the first verification information corresponding to the first operation instruction returned to the terminal device is the first verification code, and the foregoing is only a preferred mode of the embodiment of the present application, and the inventor may The specific content of the first verification information corresponding to the first operation instruction returned to the terminal device after the first operation instruction input by the user to the target application in the terminal device is arbitrarily set, and is not limited herein.
在本申请实施例中,优选的,当第一验证信息为利用预先设置的与终端设备中目标应用程序对应的密钥对第一原始验证信息加密后生成的验证信息时,判断第一验证信息和第二验证信息的比较结果是否满足预设条件的过程如图2所示,该方法包括:In the embodiment of the present application, preferably, when the first verification information is the verification information generated by encrypting the first original verification information by using a key corresponding to the target application in the terminal device, the first verification information is determined. The process of comparing the result of the comparison with the second verification information to meet the preset condition is as shown in FIG. 2, and the method includes:
S201、获取与终端设备中目标应用程序对应的密钥。S201. Acquire a key corresponding to the target application in the terminal device.
在本申请实施例中,优选的,预先设置与终端设备中的目标应用程序对应的密钥,通过该密钥对第一原始验证信息加密生成第一验证信息。In the embodiment of the present application, preferably, a key corresponding to the target application in the terminal device is preset, and the first original verification information is encrypted by the key to generate the first verification information.
在本申请实施例中,优选的,预先设置的与终端设置中的目标应用程序对应的密钥可以为:将上述预设的与终端设备中的目标应用程序对应的各个指纹信息中的一个指纹信息按照预设密钥生成规则所生成的一个密钥,具体的有关密钥生成规则的内容详细请参见现有技术,在此不作限定。In the embodiment of the present application, preferably, the preset key corresponding to the target application in the terminal setting may be: one of the preset fingerprint information corresponding to the target application in the terminal device. The information is generated according to the default key generation rule. For details about the key generation rule, refer to the prior art, which is not limited herein.
以上仅仅是本申请实施例的优选方式,发明人可根据自己的需求任意设置预先设置的与终端设备中的目标应用程序对应的密钥的生成方式,在此不作限定。The above is only a preferred mode of the embodiment of the present application, and the inventor can arbitrarily set a preset key generation method corresponding to the target application in the terminal device according to the needs of the present invention, which is not limited herein.
在本申请实施例中,优选的,当第一验证信息为利用预先设置的与终端设备中的目标应用程序对应的密钥对第一原始验证信息加密后生成的验证信息时,在判断第一验证信息和第二验证信息的比较结果是否满足预设条件的过程中,首先需要获取与该终端设备中的目标应用程序对应的密钥。In the embodiment of the present application, preferably, when the first verification information is the verification information generated by encrypting the first original verification information by using a key corresponding to the target application in the terminal device, the first determination is performed. In the process of whether the comparison result of the verification information and the second verification information meets the preset condition, first, it is necessary to acquire a key corresponding to the target application in the terminal device.
在本申请实施例中,优选的,第一验证信息为第一验证码,若第一验证信息为利用预先设置的与终端设备中目标应用程序对应的密钥对第一原始验证信息加密后生成的验证信息时,第一原始验证信息即为第一原始验证码,第一验证码为利用预先设置的与终端设备中的目标应用程序对应的密钥对第一原始验证码加密后生成的验证码。In the embodiment of the present application, the first verification information is a first verification code, and the first verification information is generated by encrypting the first original verification information by using a key corresponding to the target application in the terminal device. The first original verification code is the first original verification code, and the first verification code is the verification generated by encrypting the first original verification code by using a key corresponding to the target application in the terminal device. code.
在本申请实施例中,优选的,第一原始验证码可随机生成。In the embodiment of the present application, preferably, the first original verification code may be randomly generated.
S202、利用密钥对第二验证信息进行解密,得到第二原始验证信息。S202. Decrypt the second verification information by using a key to obtain second original verification information.
S203、比较第一原始验证信息和第二原始验证信息,判断是否相同;当相同时,执行步骤S204;当不相同时,执行步骤S205。S203. Compare the first original verification information and the second original verification information, and determine whether they are the same; when they are the same, step S204 is performed; when they are not the same, step S205 is performed.
S204、确定第一验证信息和第二验证信息的比较结果满足预设条件。S204. Determine a comparison result of the first verification information and the second verification information to meet a preset condition.
S205、确定第一验证信息和第二验证信息的比较结果不满足预设条件。
S205. Determine that the comparison result of the first verification information and the second verification information does not satisfy the preset condition.
进一步的,在本申请实施例一提供的如图1所示的身份验证方法的基础上,还包括另一种身份验证方法,参见图3。Further, based on the identity verification method shown in FIG. 1 provided in Embodiment 1 of the present application, another identity verification method is further included, as shown in FIG. 3.
如图3所示,该方法包括:As shown in FIG. 3, the method includes:
S301、响应接收到的用户对终端设备中目标应用程序输入的第二操作指令,向终端设备返回用于提示输入账户信息和指纹信息的第一提示信息。S301. Respond to the received second operation instruction input by the user to the target application in the terminal device, and return, to the terminal device, first prompt information for prompting to input account information and fingerprint information.
在本申请实施例中,优选的,账户信息为登录信息,如,用户名和密码。以上仅仅是本申请实施例的优选方式,发明人可根据自己的需求任意设置账户信息的具体内容,在此不作限定。In the embodiment of the present application, preferably, the account information is login information, such as a username and a password. The above is only a preferred mode of the embodiment of the present application, and the inventor can arbitrarily set the specific content of the account information according to his own needs, which is not limited herein.
S302、接收用户输入的目标账户信息和第二指纹信息。S302. Receive target account information and second fingerprint information input by the user.
在本申请实施例中,优选的,当用户看到终端设备上返回的用于提示输入账户信息和指纹信息的第一提示信息后,需通过终端设备输入账户信息和指纹信息,此时,将用户通过终端设备输入的账户信息称为目标账户信息,将用户通过终端设备输入的指纹信息称为第二指纹信息。In the embodiment of the present application, after the user sees the first prompt information for prompting to input the account information and the fingerprint information, the user needs to input the account information and the fingerprint information through the terminal device. The account information input by the user through the terminal device is referred to as target account information, and the fingerprint information input by the user through the terminal device is referred to as second fingerprint information.
S303、判断目标账户信息是否为终端设备中目标应用程序的账户信息,以及第二指纹信息是否为与终端设备中目标应用程序对应的指纹信息。S303. Determine whether the target account information is account information of the target application in the terminal device, and whether the second fingerprint information is fingerprint information corresponding to the target application in the terminal device.
在本申请实施例中,优选的,预先设置有终端设备中目标应用程序的账户信息,以及与终端设备中目标应用程序对应的各个指纹信息。In the embodiment of the present application, preferably, the account information of the target application in the terminal device and the respective fingerprint information corresponding to the target application in the terminal device are preset.
具体的,分别判断目标账户信息是否为终端设备中目标应用程序的账户信息,以及第二指纹信息是否为与终端设备中目标应用程序对应的指纹信息。Specifically, it is determined whether the target account information is the account information of the target application in the terminal device, and whether the second fingerprint information is the fingerprint information corresponding to the target application in the terminal device.
S304、当目标账户信息不为终端设备中目标应用程序的账户信息,或者,第二指纹信息不为与终端设备中目标应用程序对应的指纹信息时,禁止执行与第二操作指令对应的动作。S304. When the target account information is not the account information of the target application in the terminal device, or the second fingerprint information is not the fingerprint information corresponding to the target application in the terminal device, performing the action corresponding to the second operation instruction is prohibited.
在本申请实施例中,优选的,第二操作指令指示的动作为登录终端设备中目标应用程序。In the embodiment of the present application, preferably, the action indicated by the second operation instruction is a target application in the login terminal device.
以上仅仅是本申请实施例的优选方式,发明人可根据自己的需求任意设置第二操作指令指示的动作,在此不作限定。
The above is only a preferred mode of the embodiment of the present application, and the inventor can arbitrarily set the action indicated by the second operation instruction according to his own needs, which is not limited herein.
进一步的,在本申请实施例一提供的如图1所示的身份验证方法的基础上,还包括另一种身份验证方法,参见图4。Further, based on the identity verification method shown in FIG. 1 provided in Embodiment 1 of the present application, another identity verification method is further included, as shown in FIG. 4 .
如图4所示,该方法包括:As shown in FIG. 4, the method includes:
S401、响应接收到的用户对终端设备输入的第三操作指令,向终端设备返回用于提示输入指纹信息的第二提示信息。S401. Respond to the received third operation instruction input by the user to the terminal device, returning, to the terminal device, second prompt information for prompting input of the fingerprint information.
在本申请实施例中,优选的,用户可对终端设备输入第三操作指令,当接收到用户对终端设备输入的第三操作指令后,需向终端设备返回用于提示用户输入指纹信息的第二提示信息。In the embodiment of the present application, preferably, the user may input a third operation instruction to the terminal device, and after receiving the third operation instruction input by the user to the terminal device, returning to the terminal device to prompt the user to input the fingerprint information. Two prompt information.
S402、接收用户输入的第三指纹信息。S402. Receive third fingerprint information input by a user.
在本申请实施例中,优选的,当用户看到终端设备上返回的用于提示用户输入指纹信息的第二提示信息后,需通过终端设备输入指纹信息,该指纹信息被称为第三指纹信息。In the embodiment of the present application, after the user sees the second prompt information returned by the terminal device for prompting the user to input the fingerprint information, the fingerprint information needs to be input through the terminal device, and the fingerprint information is referred to as a third fingerprint. information.
S403、当第三指纹信息不为与终端设备对应的指纹信息时,禁止执行与第三操作指令对应的动作。S403. When the third fingerprint information is not the fingerprint information corresponding to the terminal device, performing the action corresponding to the third operation instruction is prohibited.
在本申请实施例中,优选的,预先设置有与终端设备对应的各个指纹信息,当第三指纹信息不为与终端设备对应的指纹信息时,禁止执行与第三操作指令对应的动作。In the embodiment of the present application, preferably, each fingerprint information corresponding to the terminal device is preset, and when the third fingerprint information is not the fingerprint information corresponding to the terminal device, the action corresponding to the third operation instruction is prohibited.
在本申请实施例中,优选的,第三操作指令为开机启动指令或者待机唤醒指令,其中,开机启动指令用于指示开启终端设备,待机唤醒指令用于指示将终端设备从待机状态唤醒。In the embodiment of the present application, preferably, the third operation instruction is a power-on command or a standby wake-up command, wherein the power-on command is used to indicate that the terminal device is turned on, and the standby wake-up command is used to indicate that the terminal device wakes up from the standby state.
以上仅仅是本申请实施例的优选方式,发明人可根据自己的需求任意设置第三操作指令的具体内容,在此不作限定。The above is only a preferred mode of the embodiment of the present application, and the inventor can arbitrarily set the specific content of the third operation instruction according to his own needs, which is not limited herein.
通过上述对本申请实施例提供的一种身份验证方法的进一步介绍,使得本申请实施例提供的一种身份验证方法更加清晰、完整,便于本领域技术人员理解。A further description of the identity verification method provided by the embodiment of the present application makes the identity verification method provided by the embodiment of the present application clearer and more complete, and is convenient for those skilled in the art to understand.
实施例二:Embodiment 2:
图5为本申请实施例二提供的一种身份验证装置的结构示意图。FIG. 5 is a schematic structural diagram of an identity verification apparatus according to Embodiment 2 of the present application.
如图5所示,该装置包括:
As shown in Figure 5, the device includes:
信息反馈单元1,用于响应接收到的用户对终端设备中目标应用程序输入的第一操作指令,向终端设备返回与第一操作指令对应的第一验证信息;The information feedback unit 1 is configured to, in response to the received first operation instruction input by the user to the target application in the terminal device, return the first verification information corresponding to the first operation instruction to the terminal device;
信息接收单元2,用于接收用户输入的第一指纹信息和第二验证信息。The information receiving unit 2 is configured to receive first fingerprint information and second verification information input by the user.
第一判断单元3,用于判断第一指纹信息是否为与终端设备中目标应用程序对应的指纹信息。The first determining unit 3 is configured to determine whether the first fingerprint information is fingerprint information corresponding to the target application in the terminal device.
执行单元4,用于当第一指纹信息不为与终端设备中目标应用程序对应的指纹信息时,禁止执行与第一操作指令对应的动作。The executing unit 4 is configured to prohibit performing an action corresponding to the first operation instruction when the first fingerprint information is not the fingerprint information corresponding to the target application in the terminal device.
第二判断单元5,用于当第一指纹信息为与终端设备中目标应用程序对应的指纹信息时,判断第一验证信息和第二验证信息的比较结果是否满足预设条件。The second determining unit 5 is configured to determine, when the first fingerprint information is the fingerprint information corresponding to the target application in the terminal device, whether the comparison result of the first verification information and the second verification information meets a preset condition.
所述执行单元4,还用于当第一验证信息和第二验证信息的比较结果不满足预设条件时,禁止执行与第一操作指令对应的动作。The execution unit 4 is further configured to prohibit execution of an action corresponding to the first operation instruction when the comparison result of the first verification information and the second verification information does not satisfy the preset condition.
在本申请实施例中,优选的,第二判断单元比较第一验证信息和第二验证信息,判断是否相同;以及,当相同时,确定第一验证信息和第二验证信息的比较结果满足预设条件;当不相同时,确定第一验证信息和第二验证信息的比较结果不满足预设条件。In the embodiment of the present application, preferably, the second determining unit compares the first verification information and the second verification information to determine whether the same is the same; and, when the same, determines that the comparison result of the first verification information and the second verification information meets the pre- If the conditions are different, it is determined that the comparison result of the first verification information and the second verification information does not satisfy the preset condition.
在本申请实施例中,优选的,当第一验证信息为利用预先设置的与终端设备中目标应用程序对应的密钥对第一原始验证信息加密后生成的验证信息时,第二判断单元获取与终端设备中目标应用程序对应的密钥;以及,利用密钥对第二验证信息进行解密,得到第二原始验证信息;以及,比较第一原始验证信息和第二原始验证信息,判断是否相同;以及,当相同时,确定第一验证信息和第二验证信息的比较结果满足预设条件;当不相同时,确定第一验证信息和第二验证信息的比较结果不满足预设条件。In the embodiment of the present application, preferably, when the first verification information is the verification information generated by encrypting the first original verification information by using a key corresponding to the target application in the terminal device, the second determining unit acquires a key corresponding to the target application in the terminal device; and decrypting the second verification information by using the key to obtain second original verification information; and comparing the first original verification information with the second original verification information to determine whether the same And when the same, it is determined that the comparison result of the first verification information and the second verification information satisfies a preset condition; when not the same, it is determined that the comparison result of the first verification information and the second verification information does not satisfy the preset condition.
图6为本申请实施例二提供的另一种身份验证装置的结构示意图。FIG. 6 is a schematic structural diagram of another identity verification apparatus according to Embodiment 2 of the present application.
如图6所示,本申请实施例二提供的另一种身份验证装置在上述实施例提供的身份验证装置的基础上,进一步包括:第一验证单元6,第一验证单元6用于响应接收到的用户对终端设备中目标应用程序输入的第二操作指令,向终端设备返回用于提示输入账户信息和指纹信息的第一提示信
息;接收用户输入的目标账户信息和第二指纹信息;判断目标账户信息是否为终端设备中目标应用程序的账户信息,以及第二指纹信息是否为与终端设备中目标应用程序对应的指纹信息;当目标账户信息不为终端设备中目标应用程序的账户信息,或者,第二指纹信息不为与终端设备中目标应用程序对应的指纹信息时,禁止执行与第二操作指令对应的动作。As shown in FIG. 6, another identity verification apparatus provided in the second embodiment of the present application, based on the identity verification apparatus provided in the foregoing embodiment, further includes: a first verification unit 6, and the first verification unit 6 is configured to receive the response. Returning, by the user to the second operation instruction input by the target application in the terminal device, returning, to the terminal device, a first prompt message for prompting to input account information and fingerprint information
Receiving target account information and second fingerprint information input by the user; determining whether the target account information is account information of the target application in the terminal device, and whether the second fingerprint information is fingerprint information corresponding to the target application in the terminal device; When the target account information is not the account information of the target application in the terminal device, or the second fingerprint information is not the fingerprint information corresponding to the target application in the terminal device, the action corresponding to the second operation instruction is prohibited.
图7为本申请实施例二提供的又一种身份验证装置的结构示意图。FIG. 7 is a schematic structural diagram of still another identity verification apparatus according to Embodiment 2 of the present application.
如图7所示,本申请实施例二提供的又一种身份验证装置在上述实施例提供的身份验证装置的基础上,进一步包括:第二验证单元7,第二验证单元7用于响应接收到的用户对终端设备输入的第三操作指令,向终端设备返回用于提示输入指纹信息的第二提示信息;以及,接收用户输入的第三指纹信息;以及,当第三指纹信息不为与终端设备对应的指纹信息时,禁止执行与第三操作指令对应的动作。As shown in FIG. 7, another identity verification apparatus provided in Embodiment 2 of the present application further includes: a second verification unit 7 for responding to the reception, based on the identity verification apparatus provided in the foregoing embodiment. Receiving, by the user, a third operation instruction input by the terminal device to the terminal device, returning second prompt information for prompting input of the fingerprint information; and receiving third fingerprint information input by the user; and, when the third fingerprint information is not When the fingerprint information corresponding to the terminal device is prohibited, the action corresponding to the third operation command is prohibited.
本申请提供一种身份验证装置,通过响应接收到的用户对终端设备中目标应用程序的第一操作指令,向终端设备返回与第一操作指令对应的第一验证信息;接收用户输入的第一指纹信息和第二验证信息;并当第一指纹信息不为与终端设备中目标应用程序对应的指纹信息时,禁止执行与第一操作指令对应的动作;当第一指纹信息为与终端设备中目标应用程序对应的指纹信息、且第一验证信息和第二验证信息的比较结果不满足预设条件时,禁止执行与第一操作指令对应的动作的方式,实现了对终端设备使用者的身份的验证,保证了终端设备中数据的安全性。The present application provides an identity verification apparatus, by responding to a received first operation instruction of a target application in a terminal device by a user, returning first verification information corresponding to the first operation instruction to the terminal device; receiving the first input by the user The fingerprint information and the second verification information; and when the first fingerprint information is not the fingerprint information corresponding to the target application in the terminal device, prohibiting the action corresponding to the first operation instruction; when the first fingerprint information is in the terminal device When the fingerprint information corresponding to the target application and the comparison result of the first verification information and the second verification information do not satisfy the preset condition, the manner of performing the action corresponding to the first operation instruction is prohibited, and the identity of the terminal device user is realized. The verification ensures the security of the data in the terminal device.
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似部分互相参见即可。对于实施例公开的装置而言,由于其与实施例公开的方法相对应,所以描述的比较简单,相关之处参见方法部分说明即可。The various embodiments in the present specification are described in a progressive manner, and each embodiment focuses on differences from other embodiments, and the same similar parts between the various embodiments may be referred to each other. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant parts can be referred to the method part.
以上仅是本申请的优选实施方式,使本领域技术人员能够理解或实现本申请。对这些实施例的多种修改对本领域的技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本申请的精神或范围的情况下,在其它实施例中实现。因此,本申请将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。
The above is only a preferred embodiment of the present application, so that those skilled in the art can understand or implement the present application. Various modifications to these embodiments are obvious to those skilled in the art, and the general principles defined herein may be implemented in other embodiments without departing from the spirit or scope of the application. Therefore, the application is not limited to the embodiments shown herein, but is to be accorded the broadest scope of the principles and novel features disclosed herein.
Claims (10)
- 一种身份验证方法,其特征在于,包括:An authentication method, comprising:响应接收到的用户对终端设备中目标应用程序输入的第一操作指令,向所述终端设备返回与所述第一操作指令对应的第一验证信息;Responding to the first operation instruction input by the user to the target application in the terminal device, and returning, to the terminal device, first verification information corresponding to the first operation instruction;接收用户输入的第一指纹信息和第二验证信息;Receiving first fingerprint information and second verification information input by the user;判断所述第一指纹信息是否为与所述终端设备中目标应用程序对应的指纹信息;Determining whether the first fingerprint information is fingerprint information corresponding to a target application in the terminal device;当否时,禁止执行与所述第一操作指令对应的动作;When no, the action corresponding to the first operation instruction is prohibited from being performed;当是时,判断所述第一验证信息和第二验证信息的比较结果是否满足预设条件;When yes, determining whether the comparison result of the first verification information and the second verification information meets a preset condition;当不满足时,禁止执行与所述第一操作指令对应的动作。When not satisfied, the action corresponding to the first operation instruction is prohibited from being executed.
- 根据权利要求1所述的方法,其特征在于,所述判断所述第一验证信息和第二验证信息的比较结果是否满足预设条件的过程包括:The method according to claim 1, wherein the process of determining whether the comparison result of the first verification information and the second verification information meets a preset condition comprises:比较所述第一验证信息和第二验证信息,判断是否相同;Comparing the first verification information and the second verification information to determine whether they are the same;当相同时,确定所述第一验证信息和第二验证信息的比较结果满足预设条件;When the same, determining that the comparison result of the first verification information and the second verification information meets a preset condition;当不相同时,确定所述第一验证信息和第二验证信息的比较结果不满足预设条件。When they are not the same, it is determined that the comparison result of the first verification information and the second verification information does not satisfy the preset condition.
- 根据权利要求1所述的方法,其特征在于,当所述第一验证信息为利用预先设置的与所述终端设备中目标应用程序对应的密钥对第一原始验证信息加密后生成的验证信息时,The method according to claim 1, wherein the first verification information is verification information generated by encrypting the first original verification information with a key corresponding to the target application in the terminal device set in advance. Time,所述判断所述第一验证信息和第二验证信息的比较结果是否满足预设条件的过程包括:The process of determining whether the comparison result of the first verification information and the second verification information meets a preset condition includes:获取与所述终端设备中目标应用程序对应的所述密钥;Obtaining the key corresponding to the target application in the terminal device;利用所述密钥对所述第二验证信息进行解密,得到第二原始验证信息;Decrypting the second verification information by using the key to obtain second original verification information;比较所述第一原始验证信息和第二原始验证信息,判断是否相同;Comparing the first original verification information and the second original verification information to determine whether they are the same;当相同时,确定所述第一验证信息和第二验证信息的比较结果满足预设条件;When the same, determining that the comparison result of the first verification information and the second verification information meets a preset condition;当不相同时,确定所述第一验证信息和第二验证信息的比较结果不满 足预设条件。When not the same, determining that the comparison result of the first verification information and the second verification information is not satisfied Presupposed conditions.
- 根据权利要求1-3任意一项所述的方法,其特征在于,还包括:The method of any of claims 1-3, further comprising:响应接收到的用户对所述终端设备中目标应用程序输入的第二操作指令,向所述终端设备返回用于提示输入账户信息和指纹信息的第一提示信息;Responding to the second operation instruction input by the user to the target application in the terminal device, returning, to the terminal device, first prompt information for prompting to input account information and fingerprint information;接收用户输入的目标账户信息和第二指纹信息;Receiving target account information and second fingerprint information input by the user;判断所述目标账户信息是否为所述终端设备中目标应用程序的账户信息,以及所述第二指纹信息是否为与所述终端设备中目标应用程序对应的指纹信息;Determining whether the target account information is account information of a target application in the terminal device, and whether the second fingerprint information is fingerprint information corresponding to a target application in the terminal device;当所述目标账户信息不为所述终端设备中目标应用程序的账户信息,或者,所述第二指纹信息不为与所述终端设备中目标应用程序对应的指纹信息时,禁止执行与所述第二操作指令对应的动作。When the target account information is not the account information of the target application in the terminal device, or the second fingerprint information is not the fingerprint information corresponding to the target application in the terminal device, execution and execution are prohibited. The action corresponding to the second operation instruction.
- 根据权利要求4所述的方法,其特征在于,还包括:The method of claim 4, further comprising:响应接收到的用户对所述终端设备输入的第三操作指令,向所述终端设备返回用于提示输入指纹信息的第二提示信息;Responding to the received third operation instruction input by the user to the terminal device, returning, to the terminal device, second prompt information for prompting input of fingerprint information;接收用户输入的第三指纹信息;Receiving third fingerprint information input by the user;当所述第三指纹信息不为与所述终端设备对应的指纹信息时,禁止执行与所述第三操作指令对应的动作。When the third fingerprint information is not fingerprint information corresponding to the terminal device, performing an action corresponding to the third operation instruction is prohibited.
- 一种身份验证装置,其特征在于,包括:An identity verification device, comprising:信息反馈单元,用于响应接收到的用户对终端设备中目标应用程序输入的第一操作指令,向所述终端设备返回与所述第一操作指令对应的第一验证信息;An information feedback unit, configured to return, to the terminal device, first verification information corresponding to the first operation instruction, in response to the received first operation instruction input by the user to the target application in the terminal device;信息接收单元,用于接收用户输入的第一指纹信息和第二验证信息;An information receiving unit, configured to receive first fingerprint information and second verification information input by a user;第一判断单元,用于判断所述第一指纹信息是否为与所述终端设备中目标应用程序对应的指纹信息;a first determining unit, configured to determine whether the first fingerprint information is fingerprint information corresponding to a target application in the terminal device;执行单元,用于当第一指纹信息不为与所述终端设备中目标应用程序对应的指纹信息时,禁止执行与所述第一操作指令对应的动作;The executing unit is configured to prohibit, when the first fingerprint information is not the fingerprint information corresponding to the target application in the terminal device, performing an action corresponding to the first operation instruction;第二判断单元,用于当第一指纹信息为与所述终端设备中目标应用程序对应的指纹信息时,判断所述第一验证信息和第二验证信息的比较结果 是否满足预设条件;a second determining unit, configured to determine, when the first fingerprint information is fingerprint information corresponding to the target application in the terminal device, a comparison result between the first verification information and the second verification information Whether the preset conditions are met;所述执行单元,还用于当所述第一验证信息和第二验证信息的比较结果不满足预设条件时,禁止执行与所述第一操作指令对应的动作。The execution unit is further configured to prohibit execution of an action corresponding to the first operation instruction when a comparison result of the first verification information and the second verification information does not satisfy a preset condition.
- 根据权利要求6所述的装置,其特征在于,所述第二判断单元比较所述第一验证信息和第二验证信息,判断是否相同;以及,当相同时,确定所述第一验证信息和第二验证信息的比较结果满足预设条件;当不相同时,确定所述第一验证信息和第二验证信息的比较结果不满足预设条件。The apparatus according to claim 6, wherein the second determining unit compares the first verification information and the second verification information to determine whether they are the same; and, when they are the same, determines the first verification information and The comparison result of the second verification information satisfies a preset condition; when not the same, it is determined that the comparison result of the first verification information and the second verification information does not satisfy the preset condition.
- 根据权利要求6所述的装置,其特征在于,当所述第一验证信息为利用预先设置的与所述终端设备中目标应用程序对应的密钥对第一原始验证信息加密后生成的验证信息时,所述第二判断单元获取与所述终端设备中目标应用程序对应的所述密钥;以及,利用所述密钥对所述第二验证信息进行解密,得到第二原始验证信息;以及,比较所述第一原始验证信息和第二原始验证信息,判断是否相同;以及,当相同时,确定所述第一验证信息和第二验证信息的比较结果满足预设条件;当不相同时,确定所述第一验证信息和第二验证信息的比较结果不满足预设条件。The apparatus according to claim 6, wherein the first verification information is verification information generated by encrypting the first original verification information with a key corresponding to a target application in the terminal device set in advance. And the second determining unit acquires the key corresponding to the target application in the terminal device; and decrypts the second verification information by using the key to obtain second original verification information; Comparing the first original verification information and the second original verification information to determine whether they are the same; and, when they are the same, determining that the comparison result of the first verification information and the second verification information meets a preset condition; when not the same And determining that the comparison result of the first verification information and the second verification information does not satisfy the preset condition.
- 根据权利要求6-8任意一项所述的装置,其特征在于,还包括第一验证单元,所述第一验证单元用于响应接收到的用户对所述终端设备中目标应用程序输入的第二操作指令,向所述终端设备返回用于提示输入账户信息和指纹信息的第一提示信息;接收用户输入的目标账户信息和第二指纹信息;判断所述目标账户信息是否为所述终端设备中目标应用程序的账户信息,以及所述第二指纹信息是否为与所述终端设备中目标应用程序对应的指纹信息;当所述目标账户信息不为所述终端设备中目标应用程序的账户信息,或者,所述第二指纹信息不为与所述终端设备中目标应用程序对应的指纹信息时,禁止执行与所述第二操作指令对应的动作。The device according to any one of claims 6-8, further comprising a first verification unit, wherein the first verification unit is configured to respond to the received user input to the target application in the terminal device a second operation instruction, returning, to the terminal device, first prompt information for prompting to input account information and fingerprint information; receiving target account information and second fingerprint information input by the user; determining whether the target account information is the terminal device Account information of the target application, and whether the second fingerprint information is fingerprint information corresponding to the target application in the terminal device; when the target account information is not the account information of the target application in the terminal device Or, when the second fingerprint information is not fingerprint information corresponding to the target application in the terminal device, performing an action corresponding to the second operation instruction is prohibited.
- 根据权利要求9所述的装置,其特征在于,还包括第二验证单元,所述第二验证单元用于响应接收到的用户对所述终端设备输入的第三操作指令,向所述终端设备返回用于提示输入指纹信息的第二提示信息;以及,接收用户输入的第三指纹信息;以及,当所述第三指纹信息不为与所述终端设备对应的指纹信息时,禁止执行与所述第三操作指令对应的动作。 The device according to claim 9, further comprising a second verification unit, wherein the second verification unit is configured to respond to the received third operation instruction input by the user to the terminal device to the terminal device Returning to the second prompt information for prompting input of the fingerprint information; and receiving the third fingerprint information input by the user; and, when the third fingerprint information is not the fingerprint information corresponding to the terminal device, prohibiting execution and The action corresponding to the third operation instruction.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510368717.6A CN105656630A (en) | 2015-06-29 | 2015-06-29 | Identity verification method and device |
CN201510368717.6 | 2015-06-29 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017000351A1 true WO2017000351A1 (en) | 2017-01-05 |
Family
ID=56481698
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/085839 WO2017000351A1 (en) | 2015-06-29 | 2015-07-31 | Identity verification method and apparatus |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105656630A (en) |
WO (1) | WO2017000351A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106302392A (en) * | 2016-07-27 | 2017-01-04 | 深圳前海弘稼科技有限公司 | Control method and control device, terminal for intelligence plantation equipment |
CN106130739A (en) * | 2016-08-29 | 2016-11-16 | 乐视控股(北京)有限公司 | Application program login process method and device |
CN107992743A (en) * | 2017-12-04 | 2018-05-04 | 山东渔翁信息技术股份有限公司 | A kind of identity authentication method based on sandbox, device, equipment and storage medium |
CN111181725A (en) * | 2018-11-12 | 2020-05-19 | 奇酷互联网络科技(深圳)有限公司 | Identity information verification method, mobile terminal and computer storage medium |
CN110287665B (en) * | 2019-05-08 | 2020-09-15 | 口碑(上海)信息技术有限公司 | Method and device for allocating device use rights, storage medium and electronic device |
CN112002075B (en) * | 2020-08-06 | 2022-02-01 | 厦门理工学院 | Information processing method and device for improving safety of storage cabinet |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1427343A (en) * | 2001-12-18 | 2003-07-02 | 阳庆电子股份有限公司 | Device for preventing setting of equipment of software be used or altered by non authorized person |
CN103745148A (en) * | 2014-01-26 | 2014-04-23 | 广东欧珀移动通信有限公司 | Information protection method based on fingerprint recognition and mobile terminal |
CN103886239A (en) * | 2014-03-31 | 2014-06-25 | 深圳市欧珀通信软件有限公司 | User authentication method and device of mobile terminal application program |
CN103902147A (en) * | 2012-12-31 | 2014-07-02 | 腾讯科技(深圳)有限公司 | Method and device for opening application program |
CN103942481A (en) * | 2014-05-04 | 2014-07-23 | 上海鼎为电子科技(集团)有限公司 | Application access method and mobile terminal |
-
2015
- 2015-06-29 CN CN201510368717.6A patent/CN105656630A/en active Pending
- 2015-07-31 WO PCT/CN2015/085839 patent/WO2017000351A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1427343A (en) * | 2001-12-18 | 2003-07-02 | 阳庆电子股份有限公司 | Device for preventing setting of equipment of software be used or altered by non authorized person |
CN103902147A (en) * | 2012-12-31 | 2014-07-02 | 腾讯科技(深圳)有限公司 | Method and device for opening application program |
CN103745148A (en) * | 2014-01-26 | 2014-04-23 | 广东欧珀移动通信有限公司 | Information protection method based on fingerprint recognition and mobile terminal |
CN103886239A (en) * | 2014-03-31 | 2014-06-25 | 深圳市欧珀通信软件有限公司 | User authentication method and device of mobile terminal application program |
CN103942481A (en) * | 2014-05-04 | 2014-07-23 | 上海鼎为电子科技(集团)有限公司 | Application access method and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN105656630A (en) | 2016-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11055385B2 (en) | Multi-factor user authentication framework using asymmetric key | |
WO2017000351A1 (en) | Identity verification method and apparatus | |
US9369289B1 (en) | Methods and systems for performing secure authenticated updates of authentication credentials | |
US10715654B1 (en) | Methods and devices for secure authentication to a compute device | |
US10812476B2 (en) | Authorization of another device for participation in multi-factor authentication | |
US11030618B1 (en) | Authentication and personal data sharing for partner services using out-of-band optical mark recognition | |
WO2017071496A1 (en) | Method and device for realizing session identifier synchronization | |
WO2016086584A1 (en) | Method and authentication device for unlocking administrative rights | |
WO2015192670A1 (en) | User identity authentication method, terminal and service terminal | |
US20210390537A1 (en) | Authentication and personal data sharing for partner services using out-of-band optical mark recognition | |
KR20160097323A (en) | Near field communication authentication mechanism | |
WO2015158227A9 (en) | Mobile terminal control method, apparatus and system | |
US9294474B1 (en) | Verification based on input comprising captured images, captured audio and tracked eye movement | |
CN105553926A (en) | Authentication method, server, and terminal | |
WO2016155220A1 (en) | Single sign-on method, system and terminal | |
EP3480718B1 (en) | System and method for facilitating authentication via a shortrange wireless token | |
US20170201528A1 (en) | Method for providing trusted service based on secure area and apparatus using the same | |
WO2016101559A1 (en) | Secure data access method and device, and computer storage medium | |
US9210134B2 (en) | Cryptographic processing method and system using a sensitive data item | |
CN112668032B (en) | Method and system for encrypting and decrypting computer, server and mobile equipment | |
JP2006268719A (en) | Password authentication system and method | |
CN105653972B (en) | The method, apparatus and mobile terminal of storage file between multiple domain | |
JP5049179B2 (en) | Information processing terminal device and application program activation authentication method | |
WO2024139253A1 (en) | Signature authentication method and apparatus | |
KR20110078960A (en) | System and method for certification using portable storage medium, and terminal and authentication server and portable storage medium thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15896881 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 23/05/2018) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15896881 Country of ref document: EP Kind code of ref document: A1 |